First published: Mon May 25 2020(Updated: )
An Insecure Temporary File (CWE-377) vulnerability in FortiClient for Windows may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=6.0.9 | |
Fortinet FortiClient Windows | >=6.2.0<=6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-9291.
The severity level of CVE-2020-9291 is high with a score of 7.8.
FortiClient for Windows versions 6.2.1 and below are affected by CVE-2020-9291.
A local user can exploit CVE-2020-9291 by exhausting the pool of temporary file names combined with a symbolic link attack.
Yes, Fortinet has released a security advisory with fixes for CVE-2020-9291. It is recommended to update to the latest version of FortiClient for Windows to mitigate the vulnerability.